Home / Educational Content / JD Edwards / The JDE Connection: Episode 66 – Security Workbench Part III – Media Objects, Push Buttons, and more

The JDE Connection: Episode 66 – Security Workbench Part III – Media Objects, Push Buttons, and more

JDE Podcast cover image with pictures of host Chandra Wobschall and Paul Houtkooper, with white text that reads Episode 66 Security Workbench Part III: media objects, push buttons, and more

Hosted by Chandra Wobschall and Paul Houtkooper

Hello JDE Connection listeners — it’s Chandra and Paul, back for another round in our JD Edwards security series. In this episode, we wrap up our mini-series on the Security Workbench (P00950) by walking through the remaining security types and a few bonus features that help organizations maintain control, avoid chaos, and keep their CNCs from pulling their hair out.

And yes, along the way, we also covered cooling vests for dogs, awkward acronyms, and something fishy. Read on.

“FAD” – Functions As Designed… But Not Always Functional

Before we dove into the technical content, we tackled a common frustration: the dreaded “Functions As Designed” response. As Paul shared (passionately), FAD often feels like the corporate parent equivalent of “no,” without the courtesy of context or compassion. We discussed why it’s time to retire FAD as a standard response and find better ways to communicate limitations — with empathy, curiosity, and more transparency. Customers deserve to feel heard, even when we can’t accommodate their requests.

Security Types Covered in This Episode

This installment explored six more security types and two bonus controls within JD Edwards. Here’s what we discussed:

  • Media Object Security (Type G)
    Allows you to restrict the ability to add, change, delete, or view media attachments on forms or applications. Useful when safeguarding supporting documentation or attachments that shouldn’t be altered post-approval.
  • Data Browser Security (Type B)
    Governs who can access the Data Browser and what they can query. Given its power, it should be used sparingly. An unfiltered query on large tables can create system slowdowns—much to the dismay of your CNC team.
  • Push Button Security (Type U)
    Provides control over visibility and interaction with push buttons, links, or image controls. For example, users might be allowed to view a control but not activate it. Useful for enforcing segregation of duties without UI customization.
  • Text Block (Type K) and Chart Control Security (Type C)
    These settings let you restrict the use or visibility of text blocks and chart elements on a form. While not commonly used, they’re available for tailoring form access based on business roles.
  • Application Query Security
    This form-level control helps prevent wide-open searches in high-volume applications. You can configure it to issue a warning or hard error when a user fails to enter appropriate search criteria, minimizing system drag and improving performance.

Additional Security Considerations

We also touched on two additional controls that aren’t part of the standard security types but are important for administrators:

  • Read/Write Report Security (“NUR”)
    Assigning users to the “No Update Report Creation User” profile restricts them to running only read-only reports. This is particularly valuable for SOX compliance and audit controls. And yes — this sparked a reflection on Chanrdra’s enhancement request: clearer visibility into which reports actually update data.
  • External Call Security (e.g., RDA.EXE)
    You can block certain applications from being called externally (such as through Report Design Aid), adding another layer of defense for published business services and system integrity.

Midwesternism of the Day

Chandra’s contribution this week? A Midwestern gem used to describe how she sleeps: Picture a fish flailing on the deck of a boat. Paul couldn’t help but turn it into an imagined regional dance move — and possibly a new way to describe Monday mornings.

Missed the Earlier Episodes?

If you’re just tuning in, check out the earlier parts of our Security Workbench series:

We’ll be back in a future episode to cover UDO security, so stay tuned.

As always, send your feedback, questions, or topic suggestions to [email protected]. And if you have your own good story or tale to share, we’re listening.

Until next time,
Let’s keep learning, sharing, and laughing together.

Toodles!

Missed an episode? Check out the full episode list! Also, be sure to subscribe on your favorite podcast provider, or select a provider below!

A square image float left with a green border, a grey callout box with "The JDE Connection" in white and grey above a white line and "Quest on Air" in white and grey with a broadcast emblem in green. On either side of the callout are photos of the podcast hosts, Chandra Wobschall and Paul Houtkooper. To the right is a title, "About the Hosts" with text below that reads: Chandra Wobschall is a Manager, IT Business Applications with BrightView Landscapes. She has over 15 years of JD Edwards experience in Financial, Manufacturing, Procurement, Sales Orders, Contracts and Job Costing modules. Paul Houtkooper is the Vice President of JD Edwards Product Development, leading the product development group for both EnterpriseOne and JD Edwards World. He has spent 26 years with JD Edwards, beginning his tenure in applications development helping to design solutions, such as Engineer To Order and Grower Contracts & Pricing.

Learn More

Quest Oracle Community is where you learn. Ask questions, find answers, swap stories and connect to other JD Edwards customers and product experts in the JD Edwards Community, where you can also check out what’s happening in the Business Analyst SIG.

 

The JDE Connection: Episode 66 – Security Workbench Part III – Media Objects, Push Buttons, and more